1. G. Nadiammai and M. Hemalatha, "Effective approach toward intrusion detection system using data mining techniques," Egyptian Informatics Journal, vol. 15, no. 1, pp. 37--50, 2014.
2. P. Schwab, "The History of Intrusion Detection Systems (IDS) -- Part 1 Threat Stack," 2015.
3. U. Lindqvist and P. A. Porras, "Detecting computer and network misuse through the production-based expert system toolset (p-best)," in Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), 1999, pp. 146--161.
4. A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Computer Networks, vol. 51, no. 12, pp. 3448--3470, 2007.
5. T.-H. Cheng, Y.-D. Lin, Y.-C. Lai, and P.-C. Lin, "Evasion techniques: Sneaking through your intrusion detection/prevention systems," IEEE Communications Surveys Tutorials, vol. 14, no. 4, pp. 1011--1020, 2012.